Splunk Search

trying to parse out a timestamp

ytl
Path Finder

i have a log that looks something like this:

terminate_type=VOICE timestamp=11/05 14:43 trunk=A044003

the format is "month/date hour/minute". under the data preview advanced pane to parse the file, i use

# your settings
NO_BINARY_CHECK=1
SHOULD_LINEMERGE=false
TIME_FORMAT=%m/%d
TIME_PREFIX=timestamp\=
TZ=America/Los_Angeles

and it picks up the month and date fine (11/5/13). however, when i edit the format to try and pick up the time with something like:

TIME_FORMAT=%m/%d %h:%M

it screws up and thinks that the date is now:

5/14/11 2:43:00.000 PM

ie the date, month and year are all screwed up.

any suggestions welcome!

Tags (3)
0 Karma
1 Solution

ShaneNewman
Motivator
TIME_FORMAT=%m/%d %H:%M

Use %H when it is a 24 hour clock, %h is for a 12 hour clock.

View solution in original post

jtrucks
Splunk Employee
Splunk Employee

Try:

TIME_FORMAT = %m/%d %H:%M

You were using 12hr hour setting, but your log data is in 24hr notation.

--
Jesse Trucks
Minister of Magic

ShaneNewman
Motivator
TIME_FORMAT=%m/%d %H:%M

Use %H when it is a 24 hour clock, %h is for a 12 hour clock.

ShaneNewman
Motivator

Awesome, glad I could help!

0 Karma

ytl
Path Finder

duh! thanks! that worked a treat.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...